An Azure service that enables the connection of on-premises networks to Azure through site-to-site virtual private networks.
Hello Nico J
I understand that you're experiencing issues with your VPN connection between your on-prem Palo Alto to Azure VPN Gateway.
- Ensure that both the Azure Virtual Network Gateway and the Palo Alto device are configured for IPSec (IKEv2). Azure’s policy supports route-based configurations, so confirm that your setup is not using policy-based (IKEv1).
- Make sure the IP definition for the Local Network Gateway in Azure matches the external IP address of the PA. Also, verify that the Azure gateway IP is correctly defined in the Palo Alto device.
- Double-check that the shared key in the Palo Alto configuration matches the one configured in the Azure VPN Gateway, as a mismatch can cause the tunnel to fail.
- If PFS is enabled on the Palo Alto, consider disabling it temporarily to see if it resolves the issue, as it can lead to disconnections or failures.
- Please ensure that the on-prem private address prefixes are properly configured on the LNG.
- Ensure that both your Azure VPN Gateway and Palo Alto firewall are listed as validated VPN devices. Check if there might be a compatibility issue with the specific version of PAN-OS you're using. https://learn.microsoft.com/en-us/azure/vpn-gateway/vpn-gateway-about-vpn-devices#devicetable
- If you're using default parameters, the on-prem parameters should be listed as below. Please check the reference document for Default IPsec/IKE parameters
- And also, from your local on-prem machine, run a continuous
pspingtest to the azure VM private IP address and share the result. psping command: ( psping -t privateip:portno ) Reference document for PsPing - Provide the IP range's of your on-premises network and azure that connects via Site-to-Site VPN.
- Some users have found that changing the Diffie-Hellman (DH) group in the IPSec Crypto settings to match the remote peer resolved similar Phase 2 negotiation failures. For Azure peers, setting the DH group to No PFS has been suggested. Refer to this article https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008Uj1CAE
- Palo Alto's tunnel monitoring works by pinging a destination address on the other side of the tunnel. Rekeying child SAs should not cause the tunnel monitor to bring the tunnel down, but Palo Alto does not store a log of all rekeys unless debugging is enabled.
- Microsoft Azure requires IKEv2 for dynamic routing (route-based VPN). If you're using IKEv1, it is restricted to static routing only. Ensuring that your Proxy IDs match the expected traffic selectors might help resolve the issue https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm6WCAS
To assist with further investigation, could you please provide the following information:
- Share the parameters for both phase 1 and phase 2 of your Azure and on-prem VPN configurations screen shot.
- The IPSec lifetime values for your VPN setup screen shot.
- If you're using default parameters, the on-prem parameters should be listed as below. Please check the reference document for Default IPsec/IKE parameters
Hope the above answer helps! Please let us know do you have any further queries.
Please do not forget to "Accept the answer” and “up-vote” wherever the information provided helps you, this can be beneficial to other community members.